Means to ensure anonymity, expanding opportunities to stay safe online

Nowadays, people are asking questions about online privacy more often. Even a gradation of anonymity has appeared: complete, acceptable, current, absolute. Moreover, the first and the last are significantly different, despite the closeness of these concepts.

Freedom of action is determined by the level of anonymity and confidentiality

Such user actions are caused by several factors:

Meanwhile, on the Internet, everything is real and demand creates supply, no means have yet been found from this economic postulate.

In the beginning to achieve anonymity, they simply used pseudonyms, then proxy servers, today the software that provides user protection is much more diverse.

There have appeared not only browsers providing Shadow Internet connections, but even operating systems that work only in the key of anonymity, for example, Tails Live OS.

On our site you will find software that allows you to work incognito almost with any electronic devices, regardless of the used platforms, messengers, etc.

Thanks to the collected programs, you can make your network visits as secure as possible, step by step. This is accomplished by:

This kind of software is presented in open sources of information, it is blocked, so almost every network user can download, install, run and work through the shadow Internet.

However, sometimes it is important not to maintain anonymity but to protect the transmitted information. Then data encryption technologies become helpful. An important distinction from anonymity is that the data is truly confidential, although the sender and recipient may be disclosed. Partially this gives rise to a trusting relationship with the Virtual Private Network, which is used by banking structures and industrial corporations.


This resource is focused on collecting information using free programs, websites, mobile applications, etc. The main goal is to help people find resources that make it possible to get information for free.

Initially, the materials were collected focusing on information security. However, many resources from other directions were added later. Please email us if you think we have forgotten something.

The OSINT Framework project is taken as a basis.

Suggestions, comments, feedback

Write to our email [email protected]